Analysis
-
max time kernel
165s -
max time network
168s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 00:43
Static task
static1
Behavioral task
behavioral1
Sample
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe
Resource
win10-en-20211208
General
-
Target
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe
-
Size
116KB
-
MD5
fa3516c08b30932538bb589f27530b26
-
SHA1
017f0cc7ba64fd5add231f47aea15f3fb331e31d
-
SHA256
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5
-
SHA512
6f2d70f312e3593ed942f340fe052212a66dec53f2ff4f626738a1ad8e9530846fefab473be11ae4af37fcefa8d0abfb78d587164aecd2249071f43aad6b1960
Malware Config
Extracted
C:\164eki8-readme.txt
sodinokibi
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exedescription ioc process File renamed C:\Users\Admin\Pictures\NewFind.crw => \??\c:\users\admin\pictures\NewFind.crw.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\ResizeRestore.tif => \??\c:\users\admin\pictures\ResizeRestore.tif.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\users\admin\pictures\DenyEnable.tiff f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\users\admin\pictures\PingUnpublish.tiff f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\users\admin\pictures\RenameEnter.tiff f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\DenyEnable.tiff => \??\c:\users\admin\pictures\DenyEnable.tiff.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\SetWatch.raw => \??\c:\users\admin\pictures\SetWatch.raw.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\SyncCompare.crw => \??\c:\users\admin\pictures\SyncCompare.crw.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\UnpublishUndo.crw => \??\c:\users\admin\pictures\UnpublishUndo.crw.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\ClearWatch.crw => \??\c:\users\admin\pictures\ClearWatch.crw.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\HideConvertTo.crw => \??\c:\users\admin\pictures\HideConvertTo.crw.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\PingUnpublish.tiff => \??\c:\users\admin\pictures\PingUnpublish.tiff.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File renamed C:\Users\Admin\Pictures\RenameEnter.tiff => \??\c:\users\admin\pictures\RenameEnter.tiff.164eki8 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exedescription ioc process File opened (read-only) \??\E: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\G: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\K: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\M: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\S: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\T: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\W: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\A: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\B: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\U: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\V: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\Y: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\J: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\O: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\Q: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\R: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\Z: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\F: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\H: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\I: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\L: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\N: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\P: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\X: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened (read-only) \??\D: f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\epa1.bmp" f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe -
Drops file in Program Files directory 36 IoCs
Processes:
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exedescription ioc process File opened for modification \??\c:\program files\ResizeInstall.xltm f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\ShowWait.mpeg3 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\AddConnect.cfg f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\DismountRequest.inf f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\RepairSkip.TS f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\LockStart.mhtml f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\PingGet.au3 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\SearchConvertTo.ppt f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\SendUpdate.ttc f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\UnprotectRevoke.js f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\WatchSuspend.dwg f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\OutAssert.DVR-MS f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\PublishImport.DVR f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\DismountDisconnect.asp f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\MoveUnprotect.DVR-MS f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\UnregisterRename.aif f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\WatchCompare.otf f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\AssertNew.mpeg2 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\CompareResolve.asf f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\InitializeExpand.aif f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\LimitDisable.vsw f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\WatchSearch.mov f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\EnableStep.eps f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\ResizeRequest.raw f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\DisableStop.ADTS f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\GroupInvoke.ram f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\ProtectConvertFrom.jpeg f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\StopUnblock.avi f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\TestEnter.eps f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File created \??\c:\program files\164eki8-readme.txt f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File created \??\c:\program files (x86)\164eki8-readme.txt f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\MergeStart.ADT f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\UseSplit.xml f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\WriteRedo.dib f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\EnterJoin.odt f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe File opened for modification \??\c:\program files\ExitGroup.eprtx f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exepid process 3924 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe 3924 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe 3924 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe 3924 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exevssvc.exedescription pid process Token: SeDebugPrivilege 3924 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe Token: SeTakeOwnershipPrivilege 3924 f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe Token: SeBackupPrivilege 2236 vssvc.exe Token: SeRestorePrivilege 2236 vssvc.exe Token: SeAuditPrivilege 2236 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe"C:\Users\Admin\AppData\Local\Temp\f45cb3e589349f987092a654178e84520ffb34e1cd4a879b5f57ca4c570ab3e5.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3972
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236